Wireless Network Tool is a powerful command-line utility designed for monitoring and managing wireless networks. With features ranging from network scanning to handshake cracking, this tool is essential for network security professionals and enthusiasts alike.
This is a picture of how the GUI looks like
- Start Monitor Mode: Activate monitor mode to capture packets.
- Stop Monitor Mode: Deactivate monitor mode.
- Scan Networks: Discover available wireless networks in your vicinity.
- Getting Handshake: Capture WPA/WPA2 handshakes (monitor mode required).
- Install Wireless Tools: Set up necessary wireless tools for operation.
- Crack Handshake with 'rockyou.txt': Use the popular rockyou.txt wordlist for cracking handshakes.
- Crack Handshake with Custom Word List: Specify your own word list for cracking.
- Crack Handshake without Word List: Attempt to crack handshake using ESSID (handshake required).
- Create Word List: Generate a custom word list for cracking purposes.
- WPS Network Attacks: Execute attacks on WPS-enabled networks (BSSID and monitor mode required).
- Scan for WPS Networks: Identify networks with WPS enabled.
To install the Wireless Network Tool, follow these steps:
- Clone the repository:
git clone https://github.com/mmabiaa/Wi-Fi-Cracking-Tool.git
cd Wi-Fi-Cracking-Tool
- Install dependencies:
sudo apt-get install wireless-tools aircrack-ng
- Make the script executable:
chmod +x app.sh
- Run
./app.sh
Select an option by entering the corresponding number.
Contributions are welcome! If you'd like to contribute to this project, please fork the repository and submit a pull request.
This project is licensed under the MIT License - see the LICENSE file for details.
Created by Mmabiaa. Feel free to reach out for any questions or suggestions!
For more information about me and my projects, select option (0)
in the tool's menu.
Or
- **email: ** isbbydior@gmail.com
Disclaimer: This tool is intended for educational purposes and should only be used on networks that you own or have permission to test. Unauthorized access to computer networks is illegal and unethical.